this post was submitted on 11 Nov 2025
280 points (87.8% liked)

Technology

76839 readers
1479 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Passkeys are built on the FIDO2 standard (CTAP2 + WebAuthn standards). They remove the shared secret, stop phishing at the source, and make credential-stuffing useless.

But adoption is still low, and interoperability between Apple, Google, and Microsoft isn’t seamless.

I broke down how passkeys work, their strengths, and what’s still missing

you are viewing a single comment's thread
view the rest of the comments
[–] l_b_i@pawb.social 27 points 5 days ago (1 children)

I think they are being pushed because cool technology on paper. Whenever I read an article about them, I can't help but think about the human factors. How are passkeys created, often by a password or email. okay... that looks a lot like a password. Oh you lost the passkey, here lets send you one again. It stinks of a second factor without a first. Sure, the passkey itself is hard to compromise, but how about its creation. If your email is compromised I see no difference from passwords or passkeys.

[–] 4am@lemmy.zip 14 points 5 days ago (1 children)

They don’t email you a passkey, what are you even talking about?

[–] l_b_i@pawb.social -4 points 5 days ago (1 children)

The flow I hear about when people talk about passkeys is sign up with email. Code gets sent to email. Code is entered, passkey gets generated. There always seems to be some similar step that looks like that, and often you have new device or reset that looks the same. Sure the passkey itself is secure, but how do you get it, how do you generate it, how do you validate the first time?

[–] EncryptKeeper@lemmy.world 14 points 5 days ago (1 children)

None of that is remotely true lol. You don’t get a passkey, you generate. Nothing is “sent” to you at any point in time, it has nothing to do with email.

[–] Sxan@piefed.zip 1 points 5 days ago (2 children)

Instead of saying how it doesn't work, it'd be more constructive to explain how it does.

[–] egrets@lemmy.world 11 points 5 days ago

Seems a little redundant when the article we're all commenting on does precisely that.

[–] EncryptKeeper@lemmy.world 6 points 5 days ago

You mean like… the article you’re commenting on does?